HuaxiaVolcanoInstall
Static task
static1
Behavioral task
behavioral1
Sample
dbfd8982b46f492e9992aceb17705b7fb65d789dfc4f67b3b88b6861bf009150.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
dbfd8982b46f492e9992aceb17705b7fb65d789dfc4f67b3b88b6861bf009150.dll
Resource
win10v2004-20230915-en
General
-
Target
dbfd8982b46f492e9992aceb17705b7fb65d789dfc4f67b3b88b6861bf009150
-
Size
707KB
-
MD5
9f3e16525da45c0643e2dae23d65077f
-
SHA1
fe6d5ff0904f472ba8da46fe735434090f1c3a09
-
SHA256
dbfd8982b46f492e9992aceb17705b7fb65d789dfc4f67b3b88b6861bf009150
-
SHA512
143dd775016ac17e785faa3ce9022be6201800683580377131f68cd87b019685a9bf47c639ed0f0642f5123cfe5df98598cb63f68bf80a19b1d7965032e239e2
-
SSDEEP
12288:5pUhg/QyVR9C91bAPf9YQboFMAGJsCCZDUpWnRKcAMu/dxh2lbM/fWy9GgLSjmYq:X/QGPg1MPfmMACs7UI9MxEoWjgungeA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dbfd8982b46f492e9992aceb17705b7fb65d789dfc4f67b3b88b6861bf009150
Files
-
dbfd8982b46f492e9992aceb17705b7fb65d789dfc4f67b3b88b6861bf009150.dll windows:4 windows x86
da11d508fec06e7bdf0c398e2ba3e2bd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
rasapi32
RasHangUpA
user32
SetClipboardData
gdi32
OffsetViewportOrgEx
winmm
waveOutRestart
winspool.drv
DocumentPropertiesA
advapi32
RegCloseKey
shell32
Shell_NotifyIconA
ole32
CLSIDFromProgID
oleaut32
VariantCopy
comctl32
ImageList_Read
ws2_32
WSACleanup
wininet
InternetCloseHandle
comdlg32
GetFileTitleA
Exports
Exports
Sections
.text Size: 682KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE